JaanusKaapPublic / BlogHyperVLinks
Tools made for my Hyper-V blog series @ https://foxhex0ne.blogspot.com/
☆58Updated 5 years ago
Alternatives and similar repositories for BlogHyperV
Users that are interested in BlogHyperV are comparing it to the libraries listed below
Sorting:
- Driver and WinDBG scripts to dump information about all resources and lookaside lists☆68Updated 5 years ago
- clone of armadillo patched for windows☆47Updated 8 months ago
- ☆40Updated 4 years ago
- ☆46Updated 5 years ago
- Takes a Windbg dumped structure (using the 'dt' command) and formats it into a C structure☆35Updated last year
- Windbg2ida lets you dump each step in Windbg then shows these steps in IDA☆75Updated last year
- Windbg extension that allows you analyze Control Flow Guard map☆35Updated 3 years ago
- AllMemPro☆45Updated 7 years ago
- windbg plugin for win32k debugging☆75Updated 5 years ago
- Command like tool to print mitigation flags for running processes in a memory dump☆46Updated 4 years ago
- A little WinDbg extension to help dump the state of Win32k Type Isolation structures.☆38Updated 7 years ago
- VMX intrinsics plugin for Hex-Rays decompiler☆71Updated 5 years ago
- Windows 10 kernel and ntdll internal types, directly compatible with ida.☆51Updated 6 years ago
- This is a simple driver with x64 inline assembly☆56Updated 5 years ago
- CVE-2020-0890 | Windows Hyper-V Denial of Service Vulnerability proof-of-concept code☆36Updated 4 years ago
- Windows 10 UAC bypass PoC using LaunchInfSection☆34Updated 6 years ago
- A fast execution trace symbolizer for Windows.☆131Updated last year
- ☆33Updated 2 years ago
- Exploiting HEVD's WriteWhatWhereIoctlDispatch for LPE on Windows 10 TH2 through RS3 using GDI objects.☆24Updated 7 years ago
- Helper idapython code for reversing kmdf drivers☆72Updated 2 years ago
- Code-Reuse Exploits detection using Intel Processor Trace☆28Updated 7 years ago
- VMCS Auditor provides almost all of Intel's VMCS Layout checklist based on Bochs Emulator.☆32Updated 6 years ago
- ☆23Updated 4 years ago
- This utility allows you to lock every available memory regions of an arbitrary process into its working set.☆68Updated 2 years ago
- PoC for CVE-2017-0075☆37Updated 5 years ago
- Bypass for the hardening against usage of tagWnd as a kernel read/write primitive☆29Updated 8 years ago
- A research project about Windows notify routines.☆37Updated 4 years ago
- ☆41Updated 5 years ago
- View handles and object for each object type☆65Updated 5 years ago
- Master list of all my vulnerability discoveries. Mostly 3rd party kernel drivers.☆49Updated 4 years ago